Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 11:04
Static task
static1
Behavioral task
behavioral1
Sample
248da67104ded50adf2c88f56bdc10e6_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
248da67104ded50adf2c88f56bdc10e6_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
248da67104ded50adf2c88f56bdc10e6_JaffaCakes118.html
-
Size
26KB
-
MD5
248da67104ded50adf2c88f56bdc10e6
-
SHA1
4db86a2effd5e6360d75a4a6a41335d3c7cd5589
-
SHA256
53929577517aac25b789c1c6e109d315ee01ed1086644964f13758bbca327630
-
SHA512
fbf007c433c3dab0387b0efa06bd26cdd8851f191a673ebb90053f841022ead3a8dd0f52c134d2f8631fb41e0f338b2f37c5a76c79f1ecfe5e224402380d8c6d
-
SSDEEP
384:SwlbHtUE/aNQnKBwGqByVsD5GcnoH/ruKDahiNkOWZbpsA6qPCbbKsc45FJZZD2:SwlnniLqBwcozuKDtNSZbpyKh45Ti
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B673E1D1-0D2A-11EF-A296-4A24C526E2E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421328125" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2100 2904 iexplore.exe 28 PID 2904 wrote to memory of 2100 2904 iexplore.exe 28 PID 2904 wrote to memory of 2100 2904 iexplore.exe 28 PID 2904 wrote to memory of 2100 2904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\248da67104ded50adf2c88f56bdc10e6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b122b763be5b55069b9bbfcd8a8e17c
SHA1a36a335354f63ad6165d44adec42f4510761dab9
SHA256b7954dc8434b85dbd350b875181bfbff5b7c3ddc0b17fdfaa91177684a8ff41b
SHA512396dae10ae1e6729ee36e8b6ae3a4c3b1d50a3a3ff61e9adbf476749b4932d502f4997acaaed2ecc0a1f34b842686d55b30527059da82c5f88a49596d7e14633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d380114fc31ba7bb3f8603ec9adc277
SHA136ff7e96ff3cfbcee35d6cba7c73600ba4bb93d8
SHA2561c9e7ad4fecce28cbd7ccd8e3fca27ec759e425a51802e627ed6fafc2b4fa38f
SHA512293d9dfc72bfe1e10fd3bbc342b5ee2bd08d78b36c84182e42be5f8c32d750dbf76c2ab55b0d6738876b64498b4d9c604df193917665b7a50476604019112617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b995c737c00c013b10a3547988ec937
SHA15daa8ee2d4c79717bb6de7642a8bfbd5978ff45b
SHA256285759c41ca6cf5ebb491808b0ba209474c1394f729b37fdbe4132a830561d01
SHA5128e47a3f2e457deca4f66ef600a73393b4638c8496d52af0c0a31bafd461fb65ebc22852916335533c0af937e6b75475ce4f302591ab3c85a81c2e6f7f35520ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5959e3be44dff45f8cb5ff06d241d8a01
SHA1cda5b9cf395a0a3003c3f43771b798b497157318
SHA25652e00001f926b40f5286ca14f725173b2484196398836e6f072dac9069456e2d
SHA51232ae0da4f7a60dc39c2ce3fabaccc864004822fc7bd6b2a90176ad52cb1944eddaa6be967bdd1a8fb78df74109a72517cdc55cf6e81b7b0600b5a81584513154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6b252286ae070c4fa0c55e7106d9f4a
SHA10ba7edfd538360e43e3941a4e34a25f5c09951b8
SHA256c756abc9dba5567fdc437544f11e94509b76058cf209e13c6c26e492e282ca36
SHA5122f6ede2938ae16195028da7fdcfe20d419986f805d3929aa3105047146f652bcfd627f861572a40f1bc8c2f0385101ca94f4388a9c5b16ebcf479618e8f32979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e351c9abdfc76db03cdf82eb2bca383
SHA18d9f74b3d53e38e5f25faed65e9050be3ea7e566
SHA2565f5dd4ead7a7ed7d614ff96609b1d63228c10b538da347943454550880422313
SHA512e5a76831c58fad4fc45d4229b68c5b043a6c4667724dc9e2c031132b0eff2a47332cd8d74c9647c108377e8d2888a9d986f849a06727530519ce9420c4d12c4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55efc3d66ebc9fa5a743b14e09df0e95e
SHA10062aa247f5ddb10eb5540b5c0018bcfdce313ac
SHA256219011545a334e815b8df0742fb96c7fa18fdf29d6867e69547064d1c4eba771
SHA512d4e1a38692c0efec72c93bf049835233e472d5e0e423688cf373ed6dffecfd5e49903d0eab3e9030c5ddd4f134d8da241dced0c4c0cfb4d03e09797c5b22f201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500a3f7c9b81ebbe3d97837daf3a41a80
SHA16a8ef81d75df7272cf60b5a2d510e42bf6c798d2
SHA256af9290e893d2306dc210dba40af0368ccc335ca2bd1ec893ac856f91b739d1ee
SHA5121556661815bd2e85f7afffe74241a820bb100e9ef70d90245912cf23aa251083ecb937cc84b5b0e86e62ea393f29252805d4751a18266fc7e0d24bc3335265db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528a2de7b9d30e8caf5ada5061b24974c
SHA1e2c20cb55e987386618892baaf2af7ea96a97aac
SHA25698472502cf714549bb730837041373d7cf89135b8092165ad91216cf0d89d568
SHA5126df9f38cdc9cae8a8b07edee1cc1ed8c6d0ebd22635279ec0e1cbc2e86ffe07913f41257e8ecc12118d8581033de33eac145da0c41d91440f58b5cd253d11eaa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a